skip to main content
article
Free Access

The internet worm program: an analysis

Published:03 January 1989Publication History
Skip Abstract Section

Abstract

On the evening of 2 November 1988, someone infected the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versions of UNIX. The flaws allowed the program to break into those machines and copy itself, thus infecting those systems. This program eventually spread to thousands of machines, and disrupted normal activities and Internet connectivity for many days.This report gives a detailed description of the components of the worm program---data and functions. It is based on study of two completely independent reverse-compilations of the worm and a version disassembled to VAX assembly language. Almost no source code is given in the paper because of current concerns about the state of the "immune system" of Internet hosts, but the description should be detailed enough to allow the reader to understand the behavior of the program.The paper contains a review of the security flaws exploited by the worm program, and gives some recommendations on how to eliminate or mitigate their future use. The report also includes an analysis of the coding style and methods used by the author(s) of the worm, and draws some conclusions about his abilities and intent.

References

  1. Allm83. Allman, Eric, Sendmail--An Internetwork Mail Router, University of California, Berkeley, 1983. Issued with the BSD UNIX documentation set.Google ScholarGoogle Scholar
  2. Brun75. Brunner, John, The Shockwave Rider, Harper & Row, 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Cohe84. Cohen, Fred, "Computer Viruses: Theory and Experiments," PROCEEDINGS OF THE 7TH NATIONAL COMPUTER SECURITY CONFERENCE, pp. 240-263, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Denn88. Denning, Peter J., "Computer Viruses," AMERICAN SCIENTIST, vol. 76, pp. 236-238, May-June 1988.Google ScholarGoogle Scholar
  5. Dewd85. Dewdney, A. K., "A Core War Bestiary of viruses, worms, and other threats to computer memories," SCIENTIFIC AMERICAN, vol. 252, no. 3, pp. 14-23, May 1985.Google ScholarGoogle ScholarCross RefCross Ref
  6. Gerr72. Gerrold, David, When Harlie Was One, Ballentine Books, 1972. The first edition.Google ScholarGoogle Scholar
  7. Gram84. Grampp, Fred. T. and Robert H. Morris, "UNIX Operating System Security," AT&T BELL LABORATORIES TECHNICAL JOURNAL, vol. 63, no. 8, part 2, pp. 1649-1672, Oct. 1984.Google ScholarGoogle ScholarCross RefCross Ref
  8. Harr77. Harrenstien, K., "Name/Finger," RFC 742, SRI Network Information Center, December 1977.Google ScholarGoogle Scholar
  9. Morr79. Morris, Robert and Ken Thompson, "UNIX Password Security," COMMUNICATIONS OF THE ACM, vol. 22, no. 11, pp. 594-597, ACM, November 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Post82. Postel, Jonathan B., "Simple Mail Transfer Protocol," RFC 821, SRI Network Information Center, August 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Reid87. Reid, Brian, "Reflections on Some Recent Widespread Computer Breakins," COMMUNICATIONS OF THE ACM, vol. 30, no. 2, pp. 103-105, ACM, February 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ritc79. Ritchie, Dennis M., "On the Security of UNIX," in UNIX SUPPLEMENTARY DOCUMENTS, AT & T, 1979.Google ScholarGoogle Scholar
  13. Seel89. Seeley, Donn, "A Tour of the Worm," PROCEEDINGS OF 1989 WINTER USENIX CONFERENCE , Usenix Association, San Diego, CA, February 1989.Google ScholarGoogle Scholar
  14. Shoc82. Shoch, John F. and Jon A. Hupp, "The Worm Programs -- Early Experience with a Distributed Computation," COMMUNICATIONS OF THE ACM, vol. 25, no. 3, pp. 172-180, ACM, March 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The internet worm program: an analysis

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 19, Issue 1
      Jan. 1989
      86 pages
      ISSN:0146-4833
      DOI:10.1145/66093
      Issue’s Table of Contents

      Copyright © 1989 Author

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 January 1989

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader